CVE-2019-3821

Priority
Description
A flaw was found in the way civetweb frontend was handling requests for
ceph RGW server with SSL enabled. An unauthenticated attacker could create
multiple connections to ceph RADOS gateway to exhaust file descriptors for
ceph-radosgw service resulting in a remote denial of service.
Assigned-to
mdeslaur
Notes
Package
Source: ceph (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (10.2.11-0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (12.2.11-0ubuntu0.18.04.2)
Ubuntu 19.10 (Eoan Ermine):released (14.2.1-0ubuntu1)
Patches:
Upstream:https://github.com/ceph/civetweb/commit/8fba7751f61a20158fedc3fc69684e9fe8cd0dce
More Information

Updated: 2020-01-29 20:05:17 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)